noVNC before 0.5 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
{ "binaries": [ { "binary_name": "novnc", "binary_version": "1:0.4+dfsg+1+20131010+gitf68af8af3d-4" }, { "binary_name": "python-novnc", "binary_version": "1:0.4+dfsg+1+20131010+gitf68af8af3d-4" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-7436.json"